Hacking: The Ultimate Beginners Guide to Learn and Understand Hacking Effectively

Narrated by: William Bahl
Length: 1 hr and 15 mins
4.9 out of 5 stars (48 ratings)

Audible Premium Plus

$14.95 a month

1 audiobook of your choice.
Stream or download thousands of included titles.
$14.95 a month after 30 days. Cancel anytime.
Buy for $6.95

Buy for $6.95

Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Taxes where applicable.

Publisher's Summary

The world of technology is quickly changing the world we live in. We are in a world where things are progressing at a rapid pace, and it is common to carry all of our information around with us wherever we may go. This may make things more convenient, but it does bring in some issues that can compromise our security if we are not careful. This audiobook will go into detail and talk about the basics of hacking and how you can learn to protect your own personal information from cyberattacks.  

Inside this guidebook, we will discuss a lot of important aspects of hacking, such as:  

  • The basics of hacking  
  • How to create a keylogger  
  • How to prevent a physical attack  
  • How to work with social engineering  
  • How to get onto a wireless network  
  • How to send a spoofing attack  
  • And much more

When you are ready to get started with hacking and how to protect your own computer and your own network, make sure to check out this audiobook to help you to get started!
 

©2018 Zach Webber (P)2018 Rolando

What listeners say about Hacking: The Ultimate Beginners Guide to Learn and Understand Hacking Effectively

Average Customer Ratings
Overall
  • 5 out of 5 stars
  • 5 Stars
    44
  • 4 Stars
    3
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    1
Performance
  • 5 out of 5 stars
  • 5 Stars
    42
  • 4 Stars
    5
  • 3 Stars
    0
  • 2 Stars
    1
  • 1 Stars
    0
Story
  • 5 out of 5 stars
  • 5 Stars
    42
  • 4 Stars
    5
  • 3 Stars
    1
  • 2 Stars
    0
  • 1 Stars
    0

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

DECONSTRUCTS THE DISASTER

Considering i'm new to hacking this was a nice introduction tutorial for me. I have tried to learn hacking for countless times but now in the end Audible offered me a way how and where. UPDATE: Upon finally finishing course, i must admit it helped me, I've learned a lot, expended some knowledge i already had, and now it's time to continue learning some more. Both author and narrator are great and i only have words of praise for them. If you are just getting started with hacking, then there are a few different skills that you should consider getting to help make things easier. Remember that in this guidebook, we will focus all of our energy on ethical hacking so the techniques, as well as the skills, that we talk about will be based on a point of view of ethical hacking. Thank you!

24 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Discover a world you didn't realize existed!

Let's start with the basics first. Hacking is any an attempt by some person to solve a problem in a computer or to change an application through making changes in the software or the hardware. While there are some people who are really good with and are capable of successfully getting onto some systems that they do not have access to and make some changes, this is not easy, and most people will fail the moment they even start. However, both white hat and black hat hackers have the same arsenal of tools at their disposal which they can use to get the job done. Let’s take a quick look at the history of hacking. In the beginning, hackers were just some people who knew how to use the phone systems and computer systems and would often work to make changes to software to improve it and make it work a little bit better. These people were able to take things a bit further and would go through and make some modifications to the early computer programs that were coming out at the time. They would just make some changes to the program so that the software would be capable of fulfilling additional actions or could be modified so it can be used for a special reason. They got creative and sometimes made the whole program easier and better to use. As you can guess, things have changed quite a bit in the hacking world. Instead of just taking a piece of software that you are using for your own personal reasons and making some modifications, hackers are now able to illegally gain access to various systems, they can damage these systems, and even compromise cybersecurity.

21 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Worth the purchase.

Going to school for a BSIT, and I use internet courses free and paid like this one to try and get a head start in the field. These courses help me accomplish that and I feel a little more prepared and ahead of some of my peers. Zach Webber (instructor) has absolutely nailed the subject of Ethical Hacking by providing a strong premises on how to become an E.Hacker. Covered all the key topics, explained the topics in the simplest manner and gave a lot of know-how. Overall, this course is a blessing and a 'must course' for all the people who wants to learn hacking. Zach Webber is a brilliant man with lot of knowledge. The experience was great. I almost feeling like I am getting there with lot of practices. Also I was wondering to ask, now that I believe that I can some scanning and exploit as well, how can exploit a network that I have already the network configuration from my home. I believe what we did with the metasploit is almost something like that. Thank You Zach and Audible for such a informative course. Glad to have made the purchase.

18 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Stop Getting Hacked !!

The following chapters will discuss everything that you need to know to get started with hacking. Most people hear about hacking and imagine a world where evil people are always out to steal their money and their personal identity. While this label only refers to one kind of hacker, there are other hackers who are out there and do what they can to help keep your information safe. This guidebook is going to have a look at ethical hacking, and how you can use the very same techniques used by some of the most well-known hackers so, you can keep your information safe. This guidebook will take the time to carefully look at the basics that come with hacking. We will look at the basics of hacking, such as some of the different kinds of hackers, as well as how to hack passwords, how to work with social engineering, how to get onto a wireless network, and even how to create your own keylogger to gain so much more information. When you are ready to learn some more about hacking and how you can use it to keep your own computer and network safe, make sure to check out this guidebook to learn all the cool tips and tricks that you need.

17 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Protecting myself

keylogger attack allows the hacker to see what kind of information the user is typing into their computer. You can even add a screenshot tool that will allow them to not only see what is being typed into the computer but also see which website the user is working on as well. Creating a keylogger is not too difficult to accomplish as long as you have some patience and you have the right tools in place. This chapter is going to show you how to make your own keylogger with the help of the Python coding language. Python is one of the best coding languages to learn if you are just a beginner. So, let’s get started on how you can use your own keylogger to help retrieve important information, such as passwords and usernames, from your target computer in no time. So, when you are ready to create a keylogger, the first thing that you want to work on is to learn how to make a program that will help you to log the keys of your targeted user. You may find that the best way to break onto accounts and get the information that you want is to retrieve the username and password from someone who is allowed to be on the system, but how exactly are you going to make that happen? You can do it by using the other techniques that we talked about in this guidebook so far, such as guessing or using a dictionary to help you get them, but these methods will take you forever to complete, especially if the password and username are too difficult to guess. As a hacker, you do not want to spend so much time guessing what these things are because you would rather get the information as quickly as you can and move on before you get caught. And if the user does end up changing the password while you were trying to crack it using the other methods, it will just make things that much harder for you. This is why hackers have come up with more advanced and more effective methods to help them to learn what a password is. The keylogger is one of the best methods available because it will watch the keystrokes that the user is performing and then it will send this information right back to the hacker. As long as the hacker executes this properly, they will get more than enough information from the target to do what they want.

12 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Great Addition to Pen Test Training

A penetration test is a good way to get a good idea of how strong your system is and what changes you need to make. Hopefully, the system is pretty strong, and you won't have to do a ton of work in the process. Many times, though, there will be more holes in the network than you can imagine. The penetration testing is what will help you see where these weaknesses are so you can fix them. After you have had some time to finish your penetration test and wrote out your comprehensive report, there are likely some additional issues that you must fix to make the system work better. We will now move on to some of the different kinds of attacks that you can perform by yourself which will help you work on your system’s security and keep it safe. This chapter is going to talk about how you can gain physical access to your system. This physical access will make it so much easier for any hacker to get onto your system, especially if they have access to physically touch the computer in question. Sometimes, the hacker is not someone who is far away. They could be someone who works for the company and who already has access to the system. With that access, they may want to use their skills to get ahold of other information that they want. Other times, you may have some issues with security being lax around the company and even a stranger can get into the computer. There are even some people who will go so far as to dress up as someone who works at the company just to gain access to their premises, and the larger a company, the easier it is to get away with this technique. Since the world is quickly changing and there are a lot of changes in technology all the time like the latest smartphones, USB drives tablets and other devices. These devices can make it really easy for the hacker to get ahold of the information that they want from you and they’ll be gone before you even know they were there. S

6 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Discover a world you didn't realize existed!

This book has completely reprogrammed and transformed my life. Basically feeling like I'm 25 years young ready to reconquer the world improvement!I loved all the examples and stories used. I wish there was a bit more humour. Very helpful book to me. Understanding what drives people and knowing how to address them individually has been very helpful in my corporate training. What I learned has also helped me understand me and what works best for me. Although not an US citizen, this book sheds slot of light over the subjects that technology advancement is bringing to us humans. With the amount that is now invested in AI and machine learning, it's also time to invest in humanizing technology and protecting our privacy. This is a great book that allows you to know the structure of how another person thinks and moves through the world. It helps so you will learn to to not only hear the different Ways a person responds in the world it also gives you questions to ask so that you can get the specific information you need to influence and/ or help the person.

2 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

This is the Book For YOU!

Very good foundation to networks and the internet! Makes things much easier to understand when watching more advanced classes.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Good for those who need to be more savvy.

The content is very good and informative, practicing the things same time has given a very good clarity of the theoretical knowledge.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Provocative

I love everything about this audiobook. It’s all explained clearly for anyone to understand. I feel like I’m finally getting somewhere with my dream of being an ethical hacker. Would recommend to anyone wanting to start!

Sort by:
Filter by:
  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Beverly
  • Beverly
  • 06-20-20

The future is a double edged sword

I was familiar with all of the network basics, but it was good refresher nonetheless. Took this course to have a good foundation before tackling the Kali Linux course. Found the explanations clear and thorough and the narrator ( William Bahl ) speaks clearly, which helps a lot.

24 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Leslie Hummer
  • Leslie Hummer
  • 06-21-20

Disturbing but you want to know.

One of the first things that you can do to go along with your plan is to explore some physical controls that you could use. This means that you may need to get together with some members of your security team and see what they can do to keep your office safe, how they will manage who accesses what, and how they monitor what goes on around them. You may notice that in your company, especially with a larger company, there could be some sections that are public, some that are private, and some that are completely restricted. Knowing where these sections are can help you come up with the technique that will work best for the situation at hand. To start, you should look into what is being done with perimeter security. You should spend some time checking out the outside of the business, such as the cameras, the surveillance, any walls or fences, mantraps and anything that would make it more difficult for someone to sneak into the building. If you are missing out on some of these things, it may be time to add them in to bolster your security and make sure everything’s safe. You personally need to go through and perform this perimeter check. It is not enough to entrust this task completely to your security team and have them do it because there are some things they might miss. If your company is a little bit larger, it may be a good idea to consider implementing the use of ID badges. Some companies like to use these because the badges make it easier to control and monitor where each employee is at different times. They can also check out the files and directories that the employee will create or modify based on the information gleaned from their badges. This helps make sure that everyone will be honest and it will also give you the ability to monitor people and see if they’re doing something they shouldn't.

22 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Nicole  Dunigan
  • Nicole Dunigan
  • 06-22-20

Seems one of a kind at present

As a beginner, you may be curious as to why you would want to go through and do a penetration test in the first place. There are many reasons that you should do this kind of test, but the biggest reason is to determine which weaknesses the hacker will take advantage of when they want to gain access to the network. Hackers are often looking for ways to get onto a certain system and steal valuable information, so it is your job as an ethical hacker to find these weaknesses so that you can cut them out and keep the hackers out. As the one who is doing the penetration test, you will need to keep a sharp eye out when you are looking through the system. You need to hack and then attack your own system to reveal weaknesses and then fix up all of the holes to keep other hackers out. One thing to remember about these tests is that you need to do them on a regular basis to help keep it up. There are a lot of changes that can happen and you want to be prepared. Another reason that a lot of hackers choose to go with a penetration test is that it will show the management of a company that you are in need of more resources to do your job. The report that you will fill out should mention that there are more than a few issues present, and it is important that management is kept upto-date with whatever it is that you were doing at the time. One issue that a big company may have is that they are not sure whether their internal security team is doing the job they are supposed to. This is when a company will hire a third-party to help get the work done. These are people who don’t have any ties to the business and are more than capable of ensuring that the system is kept secure as much as possible.

19 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Mary  Stirling
  • Mary Stirling
  • 06-23-20

Are My Thoughts Really My Own Thoughts

Zach was an exceptional instructor in this course. He broke down each phase of the hacking process into easily-digestible pieces that any newbie like myself could understand. The next step is to get started on your own adventures with hacking. As an ethical hacker, you will end up using a lot of the great techniques that we talked about in this guidebook, but you will use them for a different reason. You can go through the different topics that we discussed in this guidebook and learn how to check your own computer or network for vulnerabilities and keep it protected from all those hackers. Learning how to successfully perform a few techniques with hacking is important and invaluable to guarantee the protection of your system and your own personal computer. When you are ready to learn how to make these methods work out for you and how to do some of your own hacking, make sure to check out this guidebook to help you get started. Thank you Zach Webber for sharing your wealth of knowledge with us here at Audible. I plan on taking more of your courses in the near future!

17 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Calandra Legg
  • Calandra Legg
  • 06-25-20

An absolutely critical distinction is made!

Technology is undeniably a vital component to our modern lives. We use our phones not only to call people but also to take pictures, to send emails, to get directions, and even to shop. Many people have laptops, portable players they can use to listen to their music, drones, and so much more. We go to the grocery store, and when we make a purchase, we will use a scanner to get the price of the items as well as a card reader to take our money. There are very few aspects of our lives where technology hasn’t taken over. Because of how technology is quickly taking over the world, it should come as no surprise that hacking is a growing concern as well. There are many people who are online all the time. They may be working online, doing some form of business online, using their phones and computers, sending payments, shopping, or doing something else online. These are all things that we are used to doing on a daily basis and because of this, it is easy for a hacker to take over and steal this information from us. If they get access to just a few systems, they have the potential to wreak a lot of havoc. It is likely that you have heard of hackers at some point or another in your life. Usually, you’ll hear about them in a big story where a hacker was able to steal thousands of identities or thousands of dollars’ worth of money and then was caught in the act. But there are many kinds of hackers that you may come across out there and there are a lot of times when they might never be caught at all. The first type of hacker, the ‘black hat’ hacker, is the definition or label that most people associate with hackers. They are the kind of hackers who gain access to a private system, without having the right permissions and then steal information that they’re planning to use later on.

15 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Sylvia  Livingston
  • Sylvia Livingston
  • 06-27-20

What you don't know can be important

Spamming is the next technique that you can use, and it is similar to what you will do with phishing. You perform this attack by sending out a ton of emails, basically as many as you can, and hope that at some point, the user will become curious enough to open up one or more. These emails are set up to include free things, such as a coupon or a book, but the user will have to provide some personal information first. There are times when the hacker will pretend that they are from a verified software vendor. The hacker will then send out an email that says how the target must download the software patch to help out with some application or software that they already have. The patch is usually offered for free, which may convince the target to use it. But the target will not have asked for any of this ahead of time. The hacker will have something added to the patch, such as a ‘Trojan horse’ or a ‘backdoor,’ and then they can gain access to the network, without the target even noticing what just happened. Spamming can be quite effective because it is almost impossible for the target to trace any information back to the hacker. The hacker can work with some tools like a proxy service and some remailers so that they are hidden online while they are doing these attacks.

12 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Ruth Hudson
  • Ruth Hudson
  • 07-02-20

Heavy on the social but still solid on the enginee

Social engineering has been one of the biggest threats to businesses and consumers in the past few years. This is because social engineering is making it possible for hackers to exploit the weaknesses that come with a system, namely the people because this is really easy for them to do and allows the hacker to get the information that they want. The hacker may decide to send an email or something else and will wait for the user to click on it. When they click on it or fill in the information, the hacker will then get the information that they require. This can be easier than using the network. The hardest part of doing this for a hacker is that they need to find a way to get the other person to trust them. If the information they send over is a little off or doesn’t seem right to the user, then the user is never going to look it over, and the hacker will not get the information that they want. But if the hacker is able to gain the trust of the other person, then they will be able to exploit that person and have them do exactly what they want. One thing that you will notice when it comes to social engineering is that it is often done with the use of a physical security hack. The goal of the hacker who committed these attacks is to make someone who has that information trust them so that the hacker is then able to get that information and use it the way that they want. There are a number of ways that the hacker can use social engineering to deliver the intended results. The hacker could send out an email to their target which will contain some links with a virus. The user simply needs to click on the link and some malware or a virus will download and allow the hacker to get what they want. If you are an ethical hacker and you already working with the company and want to gain access, you can talk to your IT department, and tell them that you lost your badge or other ID. They may be willing to hand over the keys so that you, as the hacker, will have access to get ahold of all the digital and physical files that you might need. As you are looking at some of these examples of social engineering you will find that they are really simple and that they are really effective when you put them to use. The hacker simply needs to get the user to trust them (which can take some time and patience), but the user will eventually hand over the needed information to the hacker when it finally works.

4 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Jackson
  • Jackson
  • 07-03-20

Mind Blower

Terrific intro.. extremely pleased with voice, content, pace and detail. Highly recommend as a first step!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for James
  • James
  • 07-03-20

The topic is the point

Simple, basic level building block of Security. Love how its boiled down to the basic elements of how vulnerabilities are exploited.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Jennifer
  • Jennifer
  • 07-03-20

Educational

Basic course.. .just enough to get you started. Instructor was clear and detailed with his instructions.